Government Corruption Media ArticlesExcerpts of Key Government Corruption Media Articles in Major Media
Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The Pentagon provided more than 1.45 million firearms to various security forces in Afghanistan and Iraq, including more than 978,000 assault rifles, 266,000 pistols and almost 112,000 machine guns. Many of the recipients of these weapons became brave and important battlefield allies. But many more did not. The weapons were part of a vast and sometimes minimally supervised flow of arms from a superpower to armies and militias often compromised by poor training, desertion, corruption and patterns of human rights abuses. The Pentagon said it has records for [about 700,000] firearms. This is an amount ... that only accounts for 48 percent of the total small arms supplied by the U.S. government that can be found in open-source government reports. By this year, various internet arms traders, including many on Facebook, were hawking a seemingly unending assortment of weapons of obvious American origin. Facebook closed many pages in the Middle East that were serving as busy arms bazaars, including pages in Syria and Iraq on which firearms with Pentagon origins accounted for a large fraction of the visible trade. But many new arms-trading Facebook pages have since cropped up, including, according to their own descriptions, virtual markets operating from Baghdad and Karbala. The procession of arms purchases and handouts has continued to this day.
Note: A 2015 report describes how the US armed ISIS in Iraq. This eye-opening report shows how the US was involved in the creation of ISIS. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
EpiPen prices aren't the only thing to jump at Mylan. Executive salaries have also seen a stratospheric uptick. Proxy filings show that from 2007 to 2015, Mylan CEO Heather Bresch's total compensation went from $2,453,456 to $18,931,068, a 671 percent increase. During the same period, the company raised EpiPen prices, with the average wholesale price going from $56.64 to $317.82, a 461 percent increase. In 2007 the company bought the rights to EpiPen, a device used to provide emergency epinephrine to stop a potentially fatal allergic reaction and began raising its price. In 2008 and 2009, Mylan raised the price by 5 percent. At the end of 2009 it tried out a 19 percent hike. The years 2010-2013 saw a succession of 10 percent price hikes. And from the fourth quarter of 2013 to the second quarter of 2016, Mylan steadily raised EpiPen prices 15 percent every other quarter. After Mylan acquired EpiPen the company also amped up its lobbying efforts. In 2008, its reported spending on lobbying went from $270,000 to $1.2 million, according to opensecrets.org. Legislation that enhanced its bottom line followed, with the FDA changing its recommendations in 2010 that two EpiPens be sold in a package instead of one. And in 2013 the government passed a law to give block grants to states that required they be stocked in public schools.
When it comes to women’s progress, the United States doesn’t exactly bring home the gold. We rank 72nd in women’s political participation, with women holding less than 20% of congressional seats. Paid maternity leave? The United States comes in last. But at long last, we’re number one at something: Texas has the highest maternal mortality rate in the developed world. The rate of women dying from pregnancy complications doubled from 2010-2014. It’s not a coincidence, of course, that there was another major happening around women’s health in Texas during those years: the deliberate closure of clinics that provide abortion and a drastic funding cut to the state’s family planning budget. Texas gutted the state’s family planning budget by more than $73m in 2011, forcing clinics to shut down and dramatically reducing the number of women they could provide services to. By 2014, 600 women had died from pregnancy-related complications. It’s almost as if what feminists have been saying for years is true: limiting reproductive rights hurts women across the board. Access to reproductive care is necessary not just to prevent or end pregnancies, but to ensure healthy outcomes for those who choose to carry their pregnancies to term.
When a drum containing radioactive waste blew up in an underground nuclear dump in New Mexico two years ago, the Energy Department rushed to quell concerns in the Carlsbad desert community and quickly reported progress on resuming operations. The early federal statements gave no hint that the blast had caused massive long-term damage to the dump, a facility crucial to the nuclear weapons cleanup program that spans the nation, or that it would jeopardize the Energy Department’s credibility in dealing with the tricky problem of radioactive waste. But the explosion ranks among the costliest nuclear accidents in U.S. history. The long-term cost of the mishap could top $2 billion, an amount roughly in the range of the cleanup after the 1979 partial meltdown at the Three Mile Island nuclear power plant in Pennsylvania. The dump, officially known as the Waste Isolation Pilot Plant, was designed to place waste from nuclear weapons production since World War II into ancient salt beds, which engineers say will collapse around the waste and permanently seal it. The equivalent of 277,000 drums of radioactive waste is headed to the dump, according to federal documents. It had operated problem-free for 15 years and was touted by the Energy Department as a major success until the explosion. Though [an] error at the Los Alamos lab caused the accident, a federal investigation found more than two dozen safety lapses at the dump. The dump’s filtration system was supposed to prevent any radioactive releases, but it malfunctioned.
Note: For more along these lines, see concise summaries of deeply revealing news articles on the grave risks of nuclear technologies.
The United States Army's finances are so jumbled it had to make trillions of dollars of improper accounting adjustments to create an illusion that its books are balanced. The Defense Department’s Inspector General ... said the Army made $2.8 trillion in wrongful adjustments to accounting entries in one quarter alone in 2015, and $6.5 trillion for the year. The amounts dwarf the Defense Department’s entire budget. The "forced" adjustments rendered the statements useless because "DoD and Army managers could not rely on the data in their accounting systems when making management and resource decisions." [This] is the latest example of the severe accounting problems plaguing the Defense Department for decades. As a result, there has been no way to know how the Defense Department – far and away the biggest chunk of Congress’ annual budget – spends the public’s money. "Where is the money going? Nobody knows," said Franklin Spinney, a retired military analyst for the Pentagon. For years, the Inspector General - the Defense Department's official auditor - has inserted a disclaimer on all military annual reports. The accounting is so unreliable that "the basic financial statements may have undetected misstatements that are both material and pervasive." DFAS [Defense Finance and Accounting Services] also could not make accurate year-end Army financial statements because more than 16,000 financial data files had vanished from its computer system.
Note: $6.5 trillion is the equivalent of $20,000 for every citizen of the US. If any business or other branch of government had balance sheets like this, it would be all over the news with people demanding reform. Why does the military get away with this year after year? See the actual Department of Defense report for more. Then see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
Could an American election’s outcome be altered by a malicious actor on a computer keyboard? I have had three jobs that, together, taught me at least one thing: If it’s a computer, it can be hacked. I served as the White House senior cybersecurity policy adviser. I served on [President Obama's] five-person post–Edward Snowden investigative group on the National Security Agency, intelligence and technology. And for over a decade I have advised American corporations on cybersecurity. Those experiences confirm my belief that if sophisticated hackers want to get into any computer or electronic device, even one that is not connected to the internet, they can do so. Now consider that a majority of states use some kind of combination of electronic voting and a type of paper trail, but there is no standard nationwide. In most states the data that are used to determine who won an election are processed by networked, computerized devices. There are almost no locations that exclusively use paper ballots. Some states ... employ electronic voting machines that produce no paper trail, therefore there is nothing to count or recount and no way to ensure that what a voter intended is what was recorded and transmitted. If someone makes the charge after this election that the results were altered by hackers, our country has almost no way of credibly refuting that claim. Thus American voters will have no way to know if they can trust the results of the election.
Note: For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
As the United States and its allies continue their bombing campaign against the Islamic State in Iraq and Syria, many more noncombatants are perishing than they seem prepared to admit. Airwars, the organization I lead, at present estimates that at least 1,500 civilians have been killed by the United States-led coalition. Similar or higher tallies are reported by other monitoring groups, like Iraq Body Count and the Syrian Observatory for Human Rights. But coalition officials have publicly admitted just 55 deaths. It may just be a matter of looking. “Our policy is not to go out and seek” allegations of civilian casualties, a senior official from United States Central Command, or Centcom, which oversees the bombing campaign, told me recently when I asked about the discrepancy between reports of noncombatant deaths and official investigations. It took about 15 months into the war for any admission of civilian deaths in Iraq - despite thousands of airstrikes and more than 130 reported incidents. An average of 173 days still passes between a civilian casualty in Iraq or Syria and any public admission of responsibility. The Pentagon is not alone in its accounting failures. Russia still denies the more than 2,000 deaths it has most likely caused in Syria, while all 12 of the United States’ coalition partners insist they have killed only “bad guys.” This then is a systemic problem, one that suggests militaries are at present unfit - or unwilling - to count the dead accurately from above.
Note: The above was written by Chris Woods, author of “Sudden Justice: America’s Secret Drone Wars.” For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days. A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate. The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO). The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used “in the largest and most critical commercial, educational and government agencies around the world,” said [former TAO operator] Blake Darche. Some former agency employees suspect that the leak was the result of a mistake by an NSA operator, rather than a successful hack by a foreign government of the agency’s infrastructure. It is not unprecedented for a TAO operator to accidentally upload a large file of tools ... one of the former employees said. “What’s unprecedented is to not realize you made a mistake,” he said. “You would recognize, ‘Oops, I uploaded that set’ and delete it.” Critics of the NSA have suspected that the agency, when it discovers a software vulnerability, frequently does not disclose it, thereby putting at risk the cybersecurity of anyone using that product.
Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
A lawsuit filed in a US district court claims that American aid to Israel is illegal under a law passed in the 1970s that prohibits aid to nuclear powers who don’t sign the Nuclear Non-Proliferation Treaty. Grant Smith, director of the Institute for Research: Middle Eastern Policy, who filed the lawsuit ... said the United States has given Israel an estimated $234 billion in foreign aid since Congress in 1976 passed the International Security Assistance and Arms Export Control Act, with its stipulation regarding countries that did not sign the NPT. Though Israel is not a signatory to the Nuclear Non-Proliferation Treaty, Smith noted that it is a known nuclear power and recipient of US aid. Israel ... is widely believed to possess dozens, if not hundreds of nuclear warheads. Smith’s lawsuit comes on the eve of an aid deal that would boost US assistance to the country. Israel already gets $3 billion a year in US aid. To sustain a policy of “nuclear ambiguity” on Israel’s weapons program, Smith says the government uses improper classification and threatens federal employees and researchers with prosecution, fines and imprisonment. The gag is driven ... by a Department of Energy directive known as WNP-136, Foreign Nuclear Capabilities. “This is an Energy Department directive that demands imprisonment for any federal official or contractor who even mentions that Israel might have a nuclear weapons program,” Smith said. Foreign aid to Israel violates two amendments of the 1961 Foreign Aid Act ... which ban aid to clandestine nuclear powers.
Note: How interesting the the US press is not covering this. Consider also that $3 billion in US aid divided by Israel's population of 8.5 million means Israel receives the equivalent of about $350 in aid per person per year, far greater than any other country. Watch a good interview with Miko Peled, a former member of Israeli special forces, on this topic. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The Merchant Marine Academy has the highest rate of sexual assault and harassment of any U.S. military school. While the school received just one report of sexual assault in the 2014-2015 academic year, student surveys taken by the government reveal that 63 percent of women and 11 percent of men experienced unwanted advances or other sexual harassment. And 17 percent of women and 2 percent of men endured some kind of sexual assault, defined as unwanted contact, from groping to rape. Those numbers exceed the combined rates at the U.S. Military Academy at West Point and the Naval, Air Force and Coast Guard academies, where 48 percent of women and 10 percent of men described sexual harassment in similar surveys. Under pressure from Congress, Kings Point hired its first sexual assault coordinator four years ago and beefed up online and face-to-face prevention training. But officials were shocked to find so few victims reporting when surveys told them otherwise. The Middle States Commission on Higher Education - which does 10-year accreditation reviews for the U.S. Education Department - placed the Merchant Marine Academy on warning in June. The commission described a “campus climate and incidence of sexual harassment and sexual assault that have been a serious and recognized problem for over 10 years. The report [criticized] the academy’s efforts to prevent misconduct as “insufficient and ineffective.”
Privately operated government prisons, which mostly detain migrants convicted of immigration offenses, are drastically more unsafe and punitive than other prisons in the federal system, a stinging investigation by the US Department of Justice’s inspector general has found. Inmates at these 14 contract prisons, the only centers in the federal prison system that are privately operated, were nine times more likely to be placed on lockdown than inmates at other federal prisons and were frequently subjected to arbitrary solitary confinement. In two of the three contract prisons investigators routinely visited, new inmates were automatically placed in solitary confinement as a way of combating overcrowding. The review also found that contract prison inmates were more likely to complain about medical care, treatment by prison staff and about the quality of food. These facilities house around 22,000 individuals, mostly deemed “low risk”, at an annual cost of $600m. They are operated by three private companies: Geo Group, Corrections Corporation of America (CCA), and Management and Training Corporation (MTC). These facilities were also more dangerous than others in the federal system. For example, the report found that inmate on inmate assaults were 28% higher in contract prisons. “This is the latest in a whole series of reports and investigations that have found very serious issues with Bureau of Prisons shadow systems of private prisons,” said Carl Takei, a staff attorney with the ACLU.
Note: Immediately following this inspector general's investigation, the US Justice Department announced plans to phase out private federal prisons. For more along these lines, see concise summaries of deeply revealing prison system corruption news articles.
Republican Mayor Richard Berry was driving around Albuquerque last year when he saw a man on a street corner holding a sign that read: “Want a Job. Anything Helps.” Throughout his administration, as part of a push to connect the homeless population to services, Berry had taken to driving through the city to talk to panhandlers about their lives. His city’s poorest residents told him they didn’t want to be on the streets begging for money, but they didn’t know where else to go. Seeing that sign gave Berry an idea. The city could bring the work to them. Next month will be the first anniversary of Albuquerque’s There’s a Better Way program, which hires panhandlers for day jobs beautifying the city. The job pays $9 an hour, which is above minimum wage, and provides a lunch. At the end of the shift, the participants are offered overnight shelter as needed. In less than a year since its start, the program has given out 932 jobs clearing 69,601 pounds of litter and weeds from 196 city blocks. And more than 100 people have been connected to permanent employment. Berry’s effort is a shift from the movement across the country to criminalize panhandling. A recent National Law Center on Homelessness & Poverty report found a noticeable increase, with 24 percent of cities banning it altogether and 76 percent banning it in particular areas. When panhandlers have been approached in Albuquerque with the offer of work, most have been eager for the opportunity to earn money, Berry said. They just needed a lift.
Note: Watch an inspiring video on this great program.
Federal drug agents regularly mine Americans’ travel information to profile people who might be ferrying money for narcotics traffickers - though they almost never use what they learn to make arrests or build criminal cases. Instead, that targeting has helped the Drug Enforcement Administration seize a small fortune in cash. The DEA surveillance is separate from the vast and widely-known anti-terrorism apparatus. DEA units assigned to patrol 15 of the nation’s busiest airports seized more than $209 million in cash from at least 5,200 people over the past decade “They count on this as part of the budget,” said Louis Weiss, a former [DEA group] supervisor. “Basically, you’ve got to feed the monster.” Federal law gives the government broad powers to seize cash and other assets if agents have evidence that they are linked to crime. That process, commonly known as asset forfeiture, has come under fire ... after complaints that police were using the law as a way to raise money rather than to protect the public or prevent crime. Court records show agents and informants flagged travelers for questioning based on whether they were traveling with one-way tickets, had paid in cash, had listed a non-working phone number on the reservation or had checked luggage. Agents said Zane Young fit that profile when they ... seized $36,000 from his bags. Young’s lawyer, Thomas Baker, said in a court filing that the drug agency’s profile was “vague, ambiguous, overbroad, and can be manipulated to include just about anyone.”
Note: Read about how the DEA stole a young man's life savings without ever charging him with a crime. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
America has been enmeshed in a wrenching discussion about how the police treat young black men. But this week’s blistering report from the Justice Department on police bias in Baltimore also exposed a different, though related, concern: how the police in that majority-black city treat women, especially victims of sexual assault. In six pages of the 163-page report documenting how Baltimore police officers have systematically violated the rights of African-Americans, the Justice Department also painted a picture of a police culture deeply dismissive of sexual assault victims and hostile toward prostitutes and transgender people. It branded the Baltimore Police Department’s response to sexual assault cases “grossly inadequate.” Baltimore officers sometimes humiliated women who tried to report sexual assault, often failed to gather basic evidence, and disregarded some complaints filed by prostitutes. Some officers blamed victims or discouraged them from identifying their assailants. And the culture seemed to extend to prosecutors, investigators found. In one email exchange, a prosecutor referred to a woman who had reported a sexual assault as a “conniving little whore.” A police officer, using a common text-message expression for laughing heartily, wrote back: “Lmao! I feel the same.” Other “pattern or practice” investigations of police departments - including in New Orleans; Puerto Rico; and Missoula, Mont. - have also identified gender bias.
Recent attempts at campaign-directed cyber-attacks have raised red flags about just how vulnerable the upcoming U.S. election is to hackers. The most vulnerable aspect of the voting process is the individual ballot. But in a digital world, far more is susceptible to tampering than the ballot itself. With digital tools integrated throughout the electoral process ... potential weak spots show up long before anyone casts the first vote. Gabriella Coleman, Wolfe Chair in Scientific and Technological Literacy at McGill University and author of the book Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous, warned even poorly executed hacks can be successful. "If you seed enough doubt, it doesn't matter if the system has been hacked or not, because people won't trust the system." With the rise of new technologies there is potential for individuals, governments, terrorist groups or hackers to use internet-based tools strategically to leak sensitive documents, collect private information and influence voter opinion and sentiment. A recent Bloomberg exposé featured a South American political hacker who engaged for a decade in what he calls "psychological operations." He created software to manage and direct an army of fake Twitter accounts. He could change the names, profile pictures, and biographies of thousands of fake accounts to suit his particular needs at the time, using those virtual crowds to sway trends and public opinion.
Note: Read more about South American political hacker Andrés Sepúlveda's effective manipulation of elections in nine countries. For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
The devastating trauma and abuse inflicted on children held by Australia in offshore detention has been laid bare in the largest cache of leaked documents released from inside its immigration regime. More than 2,000 leaked incident reports from Australia’s detention camp for asylum seekers on the remote Pacific island of Nauru – totalling more than 8,000 pages – are published by the Guardian today. The Nauru files set out as never before the assaults, sexual abuse, self-harm attempts, child abuse and living conditions endured by asylum seekers held by the Australian government, painting a picture of routine dysfunction and cruelty. Children are vastly over-represented in the reports. More than half of the 2,116 reports – a total of 1,086 incidents, or 51.3% – involve children, although children made up only about 18% of those in detention on Nauru during the time covered by the reports, May 2013 to October 2015. The findings come just weeks after the brutal treatment of young people in juvenile detention in the Northern Territory was exposed. Allegations of sexual assault ... are a persistent theme of the files. In one report an asylum seeker described being told she was “on a list” written by local Nauruan guards naming single women they were “waiting for”. In [another] report a “cultural adviser” for Wilson Security, the company that employs guards at the detention camp, allegedly told an asylum seeker who had been sexually assaulted in camp that “rape in Australia is very common and people don’t get punished”.
Note: Watch an excellent segment by Australia's "60-Minutes" team "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this topic in the US. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and sexual abuse scandals.
As part of an ongoing effort to “exploit medical intelligence,” the National Security Agency teamed up with the military-focused Defense Intelligence Agency to extract “medical SIGINT” from the intercepted communications of nonprofit groups starting in the early 2000s, a top-secret document shows. Medical intelligence can include information about disease outbreaks; the ability of a foreign regime to respond to chemical, biological, and nuclear attacks; the capabilities of overseas drugs companies; advances in medical technology; medical research, and the medical response capabilities of various governments, according to the document and others like it, provided by NSA whistleblower Edward Snowden. One of the more prominent examples of focused medical spying came in 2010, when the agency crafted a plan to stow tracking devices with medical supplies bound for an ill Osama bin Laden in order to locate the terrorist leader. One article from August 2003 identifies an NSA project to keep an eye on the evolution of biotechnology in various countries. “Can we ... determine the specific features that would distinguish a Bio Warfare Program from a benign civilian pharmaceutical production effort?” the author wrote, identifying a “suspect Iranian [biological warfare] facility” as a target for inspection. Medical intelligence gathering has continued since then, according to the so-called “black budget” proposed for the 2013 fiscal year, published in February 2012.
Police departments will be required to give the US justice department full details of deadly incidents involving their officers each quarter, under a new government system for counting killings by police that was influenced by the Guardian. Announcing a new program for documenting all “arrest-related deaths”, federal officials said they would actively work to confirm fatal cases seen in media reports and other open sources rather than wait for departments to report them voluntarily. The new system, which aims to replace a discredited count by the FBI, mirrors that of The Counted, an ongoing Guardian effort to document every death caused by law enforcement officers. Writing in the Federal Register, Department of Justice officials said their new program should increase transparency around the use of force by police and improve accountability for the actions of individual officers. The federal government has kept no comprehensive record of killings by police officers, even as a series of controversial deaths set off unrest in cities across the country over the past two years. An annual voluntary count by the FBI of fatal shootings by officers has recorded only about half the true number. The new system is being overseen by the department’s bureau of justice statistics (BJS). It would, like the Guardian’s, document deaths caused by physical force, Taser shocks and some vehicle crashes caused by law enforcement in addition to fatal shootings by officers.
Note: For more along these lines, see concise summaries of deeply revealing police corruption news articles from reliable major media sources.
Think tanks, which position themselves as “universities without students,” have power in government policy debates because they are seen as researchers independent of moneyed interests. But in the chase for funds, think tanks are pushing agendas important to corporate donors, at times blurring the line between researchers and lobbyists. And they are doing so while reaping the benefits of their tax-exempt status, sometimes without disclosing their connections to corporate interests. On issues as varied as military sales to foreign countries, international trade, highway management systems and real estate development, think tanks have frequently become vehicles for corporate influence and branding campaigns. “This is about giant corporations who figured out that by spending, hey, a few tens of millions of dollars, if they can influence outcomes here in Washington, they can make billions of dollars,” said Senator Elizabeth Warren, Democrat of Massachusetts, a frequent critic of undisclosed Wall Street donations to think tanks. Washington has seen a proliferation of think tanks, particularly small institutions with narrow interests tied to specific industries. At the same time, the brand names of the field have experienced explosive growth. [The Brookings Institution]’s annual budget has doubled in the last decade, to $100 million. The American Enterprise Institute is spending at least $80 million on a new headquarters in Washington, not far from where the Center for Strategic and International Studies built a $100 million office tower.
Note: Read more about how big money buys off institutions democracy depends on. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the corporate world.
Princeton professor Andrew Appel decided to hack into a voting machine. He bought one online. Appel parted with $82 and became the owner of ...the Sequoia AVC Advantage, one of the oldest and vulnerable, electronic voting machines in the United States. He summoned a graduate student named Alex Halderman, who could pick the machine’s lock in seven seconds. Clutching a screwdriver, [Appel then] deftly wedged out the four ROM chips - they weren’t soldered into the circuit board, as sense might dictate - making it simple to replace them with one of his own: A version of modified firmware that could throw off the machine’s results, subtly altering the tally of votes, never to betray a hint to the voter. The attack was concluded in minutes. Elections could be vulnerable at myriad strike points, among them the software that aggregates the precinct vote totals, and the voter registration rolls that are increasingly digitized. But the threat, the cyber experts say, starts with the machines that tally the votes and crucially keep a record of them - or, in some cases, don't. It’s not just the voting machines themselves - it’s the desktop and laptop computers that election officials use. And the computers that aggregate the results together from all of the optical scans. If any of those get hacked, it could could significantly disrupt the election. Hackers this year have [already] targeted voter registration rolls in Illinois and possibly Arizona, another attack highlighted by the Princeton alums.
Note: For the text of the video at the above link and more, see this webpage. For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.